搜索结果: 1-15 共查到“军事学 SPECK”相关记录17条 . 查询时间(0.064 秒)
Further observations on SIMON and SPECK families of block ciphers
SIMON SPECK DDT
font style='font-size:12px;'>
2018/11/20
SIMON and SPECK families of block ciphers are well-known lightweight ciphers designed by NSA. In this note, based on the previous investigations on SIMON, a closed formula for the squared correlations...
Differential cryptanalysis in ARX ciphers, Application to SPECK
Differential path Nested Monte-Carlo Search ARX ciphers
font style='font-size:12px;'>
2018/11/9
In this paper, we propose a new algorithm inspired by Nested to find a differential path in ARX ciphers. In order to enhance the decision process of our algorithm and to reduce the search space of our...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
secret-key cryptography HIGHT
font style='font-size:12px;'>
2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
Rotational-XOR Cryptanalysis of Reduced-round SPECK
Rotational-XOR cryptanalysis ARX Weak keys
font style='font-size:12px;'>
2017/10/30
In this paper we formulate a SAT/SMT model for Rotational-XOR (RX) cryptanalysis in ARX primitives for the first time. The model is successfully applied to the block cipher family Speck, and distingui...
Notes on the design and analysis of SIMON and SPECK
secret-key cryptography block ciphers
font style='font-size:12px;'>
2017/6/9
We discuss the design rationale and analysis of the SIMON and SPECK lightweight block ciphers.
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
SIMON SPECK FPGA
font style='font-size:12px;'>
2017/5/5
A Degenerate Grouping Power Attack (DGPA) is a type of Partitioning Power Analysis (PPA) used to extract secret keys from the power sidechannel signal of an encryption algorithm running on a device al...
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Automatic Search Differential Trail Linear Trail
font style='font-size:12px;'>
2016/4/26
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the sig...
Automatic Search for the Best Trails in ARX:Application to Block Cipher Speck
Symmetric-key Cryptanalysis ARX
font style='font-size:12px;'>
2016/4/26
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy, does not use a...
Automatic Differential Analysis of ARX Block Ciphers: with Application to SPECK and LEA
ARX SPECK LEA
font style='font-size:12px;'>
2016/3/1
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.'s framework of finding differential characteristics by...
Authenticated Encryption with SPECK
Authenticated Encryption SPECK
font style='font-size:12px;'>
2016/1/26
In this paper, we provide performance measures for software implementations
of the NSA-designed S敲歉嵌蔷128 block cipher together with various existing authenticated
encryption modes. We investigated S...
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Lightweight Block Ciphers SIMON SPECK
font style='font-size:12px;'>
2016/1/23
In 2013, the US National Security Agency proposed two new families of lightweight block ciphers: SIMON and SPECK. Currently, linear and differential cryptanalytic results for SIMON are available in ...
Improved Differential Cryptanalysis of Round-Reduced Speck
Lightweight block cipher Speck cryptanalysis
font style='font-size:12px;'>
2016/1/23
Simon and Speck are families of lightweight block ciphers designed by the U.S. National Security Agency and published in 2013. Each of the families contains 10 variants, supporting a wide range of b...
Differential Analysis of Block Ciphers SIMON and SPECK
symmetric-key differential trail tools for cryptanalysis
font style='font-size:12px;'>
2016/1/6
In this paper we continue the previous line of research on the analysis of the differential
properties of the lightweight block ciphers Simon and Speck. We apply a recently proposed technique
for au...
The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
simon speck block cipher lightweight
font style='font-size:12px;'>
2016/1/5
The last several years have witnessed a surge of activity in
lightweight cryptographic design. Many lightweight block ciphers have
been proposed, targeted mostly at hardware applications. Typically ...
SIMON and SPECK: Block Ciphers for the Internet of Things
secret-key cryptography lightweight block cipher
font style='font-size:12px;'>
2015/12/29
The U.S. National Security Agency (NSA) developed the SIMON and SPECK families of lightweight block ciphers as an aid for securing applications in very constrained environments where AES may not be su...